Hoh Peter In
Hoh Peter In
Professor of Computer Science, Korea University
Bestätigte E-Mail-Adresse bei korea.ac.kr
TitelZitiert vonJahr
Identifying quality-requirement conflicts
B Boehm, H In
IEEE software 13 (2), 25-35, 1996
5021996
Micro interaction metrics for defect prediction
T Lee, J Nam, DG Han, S Kim, HP In
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011
1072011
Selfish attacks and detection in cognitive radio ad-hoc networks
M Jo, L Han, D Kim, HP In
IEEE network 27 (3), 46-50, 2013
1042013
Applying WinWin to quality requirements: a case study
H In, B Boehm, T Rodger, M Deutsch
Proceedings of the 23rd International Conference on Software Engineering …, 2001
992001
From requirements negotiation to software architectural decisions
H In, R Kazman, D Olson
Proc. From Software Requ. to Architectures Workshop STRAW, 2001
76*2001
Multi-criteria preference analysis for systematic requirements negotiation
HP In, D Olson, T Rodgers
Proceedings 26th Annual International Computer Software and Applications …, 2002
692002
A quality-based cost estimation model for the product line life cycle
HP In, J Baik, SS Kim, Y Yang, B Boehm
Communications of the ACM 49 (12), 85-88, 2006
532006
Situation-aware contract specification language for middleware for ubiquitous computing
SS Yau, Y Wang, D Huang, HP In
The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems …, 2003
442003
Aids for identifying conflicts among quality requirements
B Boehm, H In
IEEE Software 13 (2), 25-35, 1996
441996
Supporting distributed collaborative prioritization for WinWin requirements capture and negotiations
JW Park, D Port, B Boehm, H In
Proceedings of World Multiconference on Systemics, Cybernetics and …, 1999
431999
A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks
ND Han, L Han, DM Tuan, HP In, M Jo
Information sciences 284, 157-166, 2014
412014
VIRE: Sailing a blue ocean with value-innovative requirements
S Kim, HP In, J Baik, R Kazman, K Han
IEEE software 25 (1), 80-87, 2008
362008
A security risk analysis model for information systems
HP In, YG Kim, T Lee, CJ Moon, Y Jung, I Kim
Asian Simulation Conference, 505-513, 2004
352004
Requirements Negotiation Using Multi-Criteria Preference Analysis.
HP In, D Olson
J. UCS 10 (4), 306-325, 2004
342004
A requirements negotiation model based on multi-criteria analysis
H In, D Olson, T Rodgers
Proceedings Fifth IEEE International Symposium on Requirements Engineering …, 2001
342001
Developer micro interaction metrics for software defect prediction
T Lee, J Nam, D Han, S Kim, HP In
IEEE Transactions on Software Engineering 42 (11), 1015-1035, 2016
302016
A survey: energy exhausting attacks in MAC protocols in WBANs
M Jo, L Han, ND Tan, HP In
Telecommunication Systems 58 (2), 153-164, 2015
282015
Cyber threat trend analysis model using HMM
DH Kim, T Lee, SOD Jung, HP In, HJ Lee
Third International Symposium on Information Assurance and Security, 177-182, 2007
272007
New RFID system architectures supporting situation awareness under ubiquitous environments
D Jeong, YG Kim, HP In
Journal of Computer Science 1 (2), 114-120, 2005
262005
An Adaptive FEC Mechanism Using Cross-layer Approach to Enhance Quality of Video Transmission over 802.11 WLANs.
L Han, S Park, SS Kang, HP In
KSII Transactions on Internet & Information Systems 4 (3), 2010
232010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20